Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Psyber security: a new emerging topic and research area within human security – part 2
In today’s digital world, everyone interacts with technology in one way or another, which leaves all technology users vulnerable to psyber security attacks. Because of the recent emergence of the subject of psyber security, and the infantile stage of research...
Hackers hit Apple with ransomware, MacBook design files exposed
Security Brief
Burnout in the tech industry
We need to talk about burnout. Sadly, it’s something most of us will be all too familiar with, particularly in the tech industry. A post-pandemic study revealed 62% of cyber security professionals found their role stressful. This year, the lines between work and home...
IQ Capital founder takes chair role at BVCA
Business Weekly UK
Developing a Privacy and Cybersecurity Training Program for Employees
Lexology
How does personality influence your cyber risk?
People are central to cyber security. Empowered with the right skills and tools, people can protect themselves and their organisations from cyber attack. But people aren’t all the same. Each of us has our own personality. And studies show links between our...
“Get a red-hot poker and open up my eyes, it’s so boring”: Employee perceptions of cybersecurity training
To understand employee negative perceptions of SETA programs, researchers conducted in-depth interviews with 20 Australian employees regarding their experiences with both SETA programs and non-cybersecurity related workplace training. As expected, employees had a...
Most active deep tech investors in the UK
TechSPARK
How to build good cyber security habits
We are all creatures of habit. Some habits we’d rather get rid of. But others can be beneficial. When it comes to cyber security, building good habits is essential. By building better security behaviour into our lives, we reduce our cyber risk. So how do we go about...
Research series: Personality and digital footprints in cyber security
RESEARCH SERIES Personality and digital footprints in cybersecurity CybSafe and NCC group have recently partnered to address cyber security challenges. In this jointly produced series we will be looking at the role of personality and digital footprints in cyber...
Remote Work Security Risks – 3 approaches to help you stay secure
Working remotely is changing. Our approach to cyber security needs to change too. Remote working is here to stay. Even when we reach the day where workplaces open their doors again, things won’t be as they were. CybSafe has joined a growing list of...
Understanding responses to phishing in Saudi Arabia via the theory of planned behaviour
Saudi Arabia has seen an enormous growth in Internet usage over the past few years. With increasing adoption of this technology has come a rise in cyber crime, often enabled through use of social engineering. Phishing is a prime example, aiming to deceive users into...
Phishing happens beyond technology: The effects of human behaviours and demographics on each step of a phishing process
This study investigates to what extent people’s risk-taking and decision-making styles influence the likelihood of phishing victimisation in three specific phishing steps. We asked participants to play a risk-taking game and to answer questions related to two...
Q&A: How to Avoid the Weakest Links in Your Security Chain
EM306
On demand webinar: The office of the future
WEBINAR The office of the future: What has remote working taught us about people and security? Brought to you by:Brought to you by:Your hosts: It has just been over a year since COVID-19 brought radical changes to working life. Remote working, once the exception for...
The 4 key factors for a successful phishing simulation
Phishing attacks are a problem. Over the past year, 88% of professionals reported an increase in phishing attacks. It can happen to anyone, at any time. For many, the go-to solution to this problem is a simulated phishing attack. But for this to be a success, it has...
Neil covers the latest tech news and tech startup stories without the hype on The Tech Talks Daily Podcast.
The Tech Blog Writer
Women hold only 10% of board positions in top Cybersecurity companies
Vigilence Security Magazine
Examining the generational impact on risk: Internet of Things (IoT)
The purpose of this Causal-Comparative quantitative study was to develop an increased understanding of the different generations and how they perceive risk and to what extent they are comfortable using Fitbit devices in an everyday setting. This study was conducted...
How successful was the UK’s National Cyber Security Strategy (NCSS) 2016-2021?
In 2016, the UK government launched its National Cyber Security Strategy (NCSS). The five-year plan (2016-2021) was underpinned by £1.9 billion in funding. Its purpose was to make the UK “secure and resilient to cyber threats.” Has the NCSS achieved its aims? Let’s...
Psyber security: a new emerging topic and research area within human security – part 1
With the rise of technology in every facet of daily life, the increased conveniences come with multiple security risks. When imagining cyber security, the focus is generally on the protection of personal information, and the technology that stores this information....